company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

State Service of Special Communication and Information Protection (SSSCIP) of Uk...

loading..

The world's largest manufacturers of wind turbines Nordex Group hit by a massive...

loading..

CashApp customer data of US got compromised following a former employee accessed...

Loading...

Telegram

Ukraine

Ukrainian SSSCIP warned of a newly discovered cyberattack aiming to target Teleg...

State Service of Special Communication and Information Protection (SSSCIP) of Ukraine warns of threat actors targeting aimed at gaining access to users’ Telegram accounts......

  06-Apr-2022
  2 min read
Loading...

Wine Turbine

Nordex Group

Nordex Group crippled by a cyberattack that forced them to take down there IT se...

The world's largest manufacturers of wind turbines Nordex Group hit by a massive cyberattack resulting in shutting down of their IT infrastructure…. ...

  06-Apr-2022
  2 min read
Loading...

Block

CashApp

CashApp reported a customer data breach affecting 8.2 million of its US-based u...

CashApp customer data of US got compromised following a former employee accessed its internal report impacting approx. 8.2 million users...

  06-Apr-2022
  3 min read
Loading...

Spring Boot

Spring4Shell zero-day vulnerability have already been targeted

exploitation attempts took place in the first four days since the disclosure of the severe remote code execution (RCE) flaw, tracked as CVE-2022-22965, and the associated exploit cod...

  05-Apr-2022
  1 min read
Loading...

Trezor

Email Marketing

Cryptocurrency

MailChimp confirmed a massive hack to obtain crypto assets

MailChimp & Trezor further questions about the breach details as social engineering, malware, and credential theft to gain access to numerous well-known companies, including Nvidia, Samsung, Microsoft, & Okta......

  05-Apr-2022
  3 min read
Loading...

Email

Phishing

Voicemail

27,655 users fallen prey to a WhatsApp phishing email delivering info-stealing m...

Phishing email posing as WhatsApp voice message notification circulated info-stealing malware to 27,655 email addresses...

  05-Apr-2022
  3 min read
Loading...

Brokenwire

EV

Brokenwire attack: EV charging system vulnerable against a newly discovered atta...

Brokenwire is a new attack technique that intends to potentially disrupt Combined Charging System (CCS) in electric vehicles lately prone......

  04-Apr-2022
  3 min read
Loading...

Trezor

Trezor hardware wallet mailing list was used to send fake data breach notificati...

Trezor is a hardware cryptocurrency wallet that allows you to store your crypto assets offline, rather than using cloud-based wallets or wallets stored on your PC that are more vulnerable to theft....

  03-Apr-2022
  2 min read
Loading...

RAT

BORAT

DoS

BORAT, a newly appeared RAT over DarkNet market conduct DDoS attacks, UAC bypass...

RAT, Borat enables remote threat actors to take complete control of their victim’s mouse and keyboard, access files, network points, and hide any signs of their presence......

  03-Apr-2022
  1 min read
Loading...

Supply Chain Attack

PHP

PEAR could have suffered a supply chain attack due to a 15-year-old vulnerabilit...

Vulnerability researcher disclosed the presence of critical flaws in PEAR PHP repo that could have triggered a supply chain attack that remained dormant for past 15 years... ...

  02-Apr-2022
  2 min read